• Home
  • Courses
  • About Us
  • Contact
  • Mores
    • Tech Services
    • Store
    • Tech Blog
    • FAQs
    Have any question?
    +91-9460053140
    [email protected]
    RegisterLogin
    THCBin LearningTHCBin Learning
    • Home
    • Courses
    • About Us
    • Contact
    • Mores
      • Tech Services
      • Store
      • Tech Blog
      • FAQs

      IT & Security

      • Home
      • All courses
      • IT & Security
      • The Complete Cyber Security Course! Volume 1 : Hackers Exposed
      CoursesTechnologyIT & SecurityThe Complete Cyber Security Course! Volume 1 : Hackers Exposed
      • Section 1. Introduction 7

        • Lecture1.1
          Welcome and Introduction to the Instructor! 02 min
        • Lecture1.2
          Security Quick Win! 12 min
        • Lecture1.3
          Goals and Learning Objectives – Volume 1 03 min
        • Lecture1.4
          Target Audience 02 min
        • Lecture1.5
          Study Recommendations 05 min
        • Lecture1.6
          The Forum – For Questions, Answers and Other Resources 02 min
        • Lecture1.7
          Course Updates 01 min
      • Section 2. Know Yourself - The Threat and Vulnerability Landscape 8

        • Lecture2.1
          Goals and Learning Objectives 01 min
        • Lecture2.2
          Protect What You Value 05 min
        • Lecture2.3
          What is Privacy, Anonymity and Pseudonymity 05 min
        • Lecture2.4
          Security, Vulnerabilities, Threats and Adversaries 05 min
        • Lecture2.5
          Threat Modeling and Risk Assessments 08 min
        • Lecture2.6
          Security vs Privacy vs Anonymity – Can we have it all? 02 min
        • Lecture2.7
          Defense In Depth 02 min
        • Lecture2.8
          The Zero Trust Model 04 min
      • Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape 17

        • Lecture3.1
          Goals and Learning Objectives 01 min
        • Lecture3.2
          Why You Need Security – The Value Of A Hack 05 min
        • Lecture3.3
          The Top 3 Things You Need To Stay Safe Online 01 min
        • Lecture3.4
          Security Bugs and Vulnerabilities – The Vulnerability Landscape 10 min
        • Lecture3.5
          Hackers, Crackers and Cyber Criminals 03 min
        • Lecture3.6
          Malware, Viruses, Rootkits and RATs 07 min
        • Lecture3.7
          Spyware, Adware, Scareware, PUPs & Browser hijacking 05 min
        • Lecture3.8
          What is Phishing, Vishing and SMShing 15 min
        • Lecture3.9
          Spamming & Doxing 03 min
        • Lecture3.10
          Social engineering – Scams, cons, tricks and fraud 06 min
        • Lecture3.11
          Darknets, Dark Markets and Exploit kits 08 min
        • Lecture3.12
          Governments, Spies and Secret Stuff Part I 05 min
        • Lecture3.13
          Governments, Spies and Secret Stuff Part II 11 min
        • Lecture3.14
          Regulating encryption, mandating insecurity & legalizing spying 15 min
        • Lecture3.15
          Trust & Backdoors 11 min
        • Lecture3.16
          Censorship 02 min
        • Lecture3.17
          Cyber Threat Intelligence – Stay Informed 01 min
      • Section 4. Encryption Crash Course 13

        • Lecture4.1
          Goals and Learning Objectives 01 min
        • Lecture4.2
          Symmetric Encryption 10 min
        • Lecture4.3
          Asymmetric Encryption 10 min
        • Lecture4.4
          Hash Functions 07 min
        • Lecture4.5
          Digital Signatures 05 min
        • Lecture4.6
          Secure Sockets Layer (SSL) and Transport layer security (TLS) 13 min
        • Lecture4.7
          SSL Stripping 12 min
        • Lecture4.8
          HTTPS (HTTP Secure) 07 min
        • Lecture4.9
          Digital Certificates 06 min
        • Lecture4.10
          Certificate Authorities and HTTPS 14 min
        • Lecture4.11
          End-to-End Encryption (E2EE) 02 min
        • Lecture4.12
          Steganography 08 min
        • Lecture4.13
          How Security and Encryption is Really Attacked 03 min
      • Section 5. Setting up a Testing Environment Using Virtual Machines 5

        • Lecture5.1
          Goals and Learning Objectives 01 min
        • Lecture5.2
          Introduction to Setting up a Testing Environment Using Virtual Machines 10 min
        • Lecture5.3
          Vmware 11 min
        • Lecture5.4
          Virtual box 12 min
        • Lecture5.5
          Kali Linux 03 min
      • Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux) 17

        • Lecture6.1
          Goals and Learning Objectives 01 min
        • Lecture6.2
          Security Features and Functionality 06 min
        • Lecture6.3
          Security Bugs and Vulnerabilities 06 min
        • Lecture6.4
          Usage Share 05 min
        • Lecture6.5
          Windows 10 – Privacy & Tracking 06 min
        • Lecture6.6
          Windows 10 – Disable Tracking Automatically 05 min
        • Lecture6.7
          Windows 10 – Tool : Disable Windows 10 Tracking 08 min
        • Lecture6.8
          Windows 10 – Cortana 03 min
        • Lecture6.9
          Windows 10 – Privacy Settings 09 min
        • Lecture6.10
          Windows 10 – WiFi Sense 04 min
        • Lecture6.11
          Windows 7, 8 and 8.1 – Privacy & Tracking 07 min
        • Lecture6.12
          Mac – Privacy & Tracking 04 min
        • Lecture6.13
          Linux and Unix “like” Operating Systems 04 min
        • Lecture6.14
          Linux – Debian 01 min
        • Lecture6.15
          Linux – Debian 8 Jessie – Virtual box guest additions Issue 07 min
        • Lecture6.16
          Linux – OpenBSD and Archlinux 02 min
        • Lecture6.17
          Linux – Ubuntu 01 min
      • Section 7. Security Bugs and Vulnerabilities 13

        • Lecture7.1
          Goals and Learning Objectives 01 min
        • Lecture7.2
          The Importance of Patching 04 min
        • Lecture7.3
          Windows 7 – Auto Update 01 min
        • Lecture7.4
          Windows 8 & 8.1 – Auto Update 01 min
        • Lecture7.5
          Windows 10 – Auto Update 01 min
        • Lecture7.6
          Windows – Criticality and Patch Tuesday 04 min
        • Lecture7.7
          Windows 7, 8, 8.1 & 10 – Automate the pain away from patching 09 min
        • Lecture7.8
          Linux – Debian – Patching 11 min
        • Lecture7.9
          Mac – Patching 07 min
        • Lecture7.10
          Firefox – Browser and Extension Updates 04 min
        • Lecture7.11
          Chrome – Browser and Extension Updates 01 min
        • Lecture7.12
          IE and Edge – Browser and Extension Updates 01 min
        • Lecture7.13
          Auto updates – The Impact to Privacy and Anonymity 02 min
      • Section. 8 Reducing Threat Privilege 4

        • Lecture8.1
          Goals and Learning Objectives + Removing Privilege 03 min
        • Lecture8.2
          Windows 7 – Not using admin 04 min
        • Lecture8.3
          Windows 8 and 8.1 – Not using admin 04 min
        • Lecture8.4
          Windows 10 – Not using admin 03 min
      • Section 9. Social Engineering and Social Media Offence and Defence 6

        • Lecture9.1
          Goals and Learning Objectives 01 min
        • Lecture9.2
          Information Disclosure and Identity Strategies for Social Media 13 min
        • Lecture9.3
          Identify Verification and Registration 05 min
        • Lecture9.4
          Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1 08 min
        • Lecture9.5
          Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2 10 min
        • Lecture9.6
          Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons) 05 min
      • Section 10. Security Domains 2

        • Lecture10.1
          Goals and Learning Objectives 01 min
        • Lecture10.2
          Security Domains 10 min
      • Section 11. Security Through Isolation and Compartmentalization 18

        • Lecture11.1
          Goals and Learning Objectives 01 min
        • Lecture11.2
          Introduction to Isolation and Compartmentalization 02 min
        • Lecture11.3
          Physical and Hardware Isolation – How to change the Mac Address 07 min
        • Lecture11.4
          Physical and Hardware Isolation – Hardware Serials 11 min
        • Lecture11.5
          Virtual Isolation 09 min
        • Lecture11.6
          Dual Boot 03 min
        • Lecture11.7
          Built-in Sandboxes and Application Isolation 03 min
        • Lecture11.8
          Windows – Sandboxes and Application Isolation 06 min
        • Lecture11.9
          Windows – Sandboxes and Application Isolation – Sandboxie 12 min
        • Lecture11.10
          Linux – Sandboxes and Application Isolation 03 min
        • Lecture11.11
          Mac – Sandboxes and Application Isolation 07 min
        • Lecture11.12
          Virtual Machines 11 min
        • Lecture11.13
          Virtual Machine Weaknesses 11 min
        • Lecture11.14
          Virtual Machine Hardening 09 min
        • Lecture11.15
          Whonix OS – Anonymous Operating System 21 min
        • Lecture11.16
          Whonix OS – Weaknesses 04 min
        • Lecture11.17
          Qubes OS 19 min
        • Lecture11.18
          Security Domains, Isolation and Compartmentalization 05 min
      • Section 12. BONUS - What's next? 7

        • Lecture12.1
          Important Information 01 min
        • Lecture12.2
          Congratulations 01 min
        • Lecture12.3
          Certificate of Completion for CPEs 01 min
        • Lecture12.4
          Router Vulnerability Scanning (Shodan, Qualys) 16 min
        • Lecture12.5
          Password Cracking part 07 min
        • Lecture12.6
          Bypassing Firewalls and HTTP Proxies Part 15 min
        • Lecture12.7
          Email Clients, Protocols and Authentication 13 min
        This content is protected, please login and enroll course to view this content!
        Prev Virtual Machine Weaknesses
        Next Whonix OS – Anonymous Operating System

        Leave A Reply Cancel reply

        You must be logged in to post a comment.

        Popular Courses

        Facebook Page Masterclass: Use It to Grow Your Business

        Facebook Page Masterclass: Use It to Grow Your Business

        $5.99 Free
        Learn Man In The Middle Attacks From Scratch

        Learn Man In The Middle Attacks From Scratch

        $8.99 Free
        Typographic Logos: Typography and Lettering for Logo Design

        Typographic Logos: Typography and Lettering for Logo Design

        $4.99 Free

        Follow Us

        Advertisement

        logo-eduma-the-best-lms-wordpress-theme

        +91-9460053140

        [email protected]

        Company

        • Tech Services
        • Tech Blog
        • Store
        • Become a Teacher

        Links

        • About Us
        • Profile
        • Courses

        Support

        • Become a Teacher
        • Contact
        • DMCA
        • FAQs

        Recommend

        • QR Code Generator
        • URL Shortener
        • Resume Builder
        • Android SVG to Vector Drawable

        © THCBin Learning 2018 - 20. Powered By THCBin

        • Privacy Policy
        • Terms And Conditions
        • Sitemap

        Become An Instructor?

        Join with us as an instructors and earn money hassle free!

        Get Started Now

        Connect with

        Login with Google Login with Facebook Login with LinkedIn

        Login with your site account

        Lost your password?

        Not a member yet? Register now

        Register a new account


        Are you a member? Login now

        Modal title

        Message modal